Sean Gallagher wrote:
> On 27/07/2023 5:57 pm, Ondřej Kuzník wrote:
>> I'm not sure what you're trying to achieve here. Why do you want to
>> distinguish different kinds of anonymous clients?
> 
> My clients are very asymmetric. Each has a particular job to do, and a 
> particular set of operations to perform on the database. I was trying to 
> restrict access
> for each client, to just what was needed for it to perform it's task. Then if 
> one client is compromised, damage can be (more) contained.
> 
> As it stands, before a bind, all (IP) clients look the same (Apart from the 
> IP address) - and so all clients need "auth" access to all other clients
> credentials.

That is all false. No auth privileges are needed to perform a SASL EXTERNAL 
Bind.

> If any client is granted some pre-bind rights, all clients get those same 
> rights. One compromised client makes all clients vulnerable. This is not
> necessary.

The exact same is true with what you've proposed.

> slapd _knows_ the identity of each client, it's just a matter of exposing it 
> to the ACL rules. It's not even without precedent, the sasl_ssf is
> exposed to the ACL rules before a bind, why not other properties of the sasl 
> state?
> 
> Anyway, this is just a "nice to have" idea, the real-life effect this would 
> have on security is pretty minimal. It's just frustrating when I have to 
> weaken
> access controls to do things the "right" way..

All you're doing is inventing a new authentication mechanism instead of using 
one that already exists.

-- 
  -- Howard Chu
  CTO, Symas Corp.           http://www.symas.com
  Director, Highland Sun     http://highlandsun.com/hyc/
  Chief Architect, OpenLDAP  http://www.openldap.org/project/

Reply via email to